Shaarli export of all bookmarks on Wed, 08 Nov 17 06:27:27 -0500
- The risk of okra | CSO Online
- IPv6 Primer for Deployments
- Battle Scars from OpenStack Deployments
- Kubernetes on OpenStack: The Technical Details
- Slicing Scientific Data | Linux Journal
- PoE, PoE+ and Passive POE | Linux Journal
- OpenStack 'Pike' Focuses on Basics Instead of Gee-Whiz New Features | IT Pro
- OpenStack Pike Debuts Updated Open-Source Cloud Platform
- New Features Coming in the OpenStack Pike Cloud Platform
- OpenStack Growing Both Public and Private Cloud Footprint
- Improve your bash/sh shell script with ShellCheck lint script analysis tool – nixCraft
- How to Deploy 800 Servers in 8 Hours
- Can OpenStack Beat AWS in Price
- PowerShell module: Export your computer configuration - Syst & Deploy
- Powershell Tool : Compare two computer configuration - New Version - Syst & Deploy
- Get rid of "WARNING! Your cache is running out of filedescriptors" in Squid Proxy - LinuxTechLab
- OpenStack Summit Sydney Day 1 Keynote
- Wassenaar, Cybersecurity, and Why European Officials Get Better Lunches than Americans - Lawfare
- Crunchyroll website hack tried to infect visitors with malware (updated)
- InfoSec Handlers Diary Blog - Securing SSH Services - Go Blue Team!!
- Applied Crypto Hardening
- Cloud Security: Defense in Detail if Not in Depth
- Seattle Woman Says Her Identity Has Been Stolen 15 Times Since Equifax Data Breach | HuffPost
- CPO to CISO: Four Steps for Privacy Professionals to Get Security Savvy - CPO Magazine
- The Krack Wi-fi Vulnerability Explained in Plain Terms
- Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Safe
- Jennings Aske on Getting Serious About Medical Device Security
- WiFi Exploitation with WifiPhisher
- 10 Scariest Ransomware Attacks of 2017
- On the Luxury of Abandoning a Nice Corporate Job for the Freedom of Freelancing
- AT&T Cybersecurity Report
- Does understanding the cost of IT really matter? | Virtual Me
- KVM - VM Templates - EverythingShouldBeVirtual
- Generating/Executing Terraform Plans Using Ansible - EverythingShouldBeVirtual
- Ansible - MAAS Management - EverythingShouldBeVirtual
- Learn Micro Services Monitoring - Vagrant Provisioned Using Ansible - EverythingShouldBeVirtual
- InfoSec Handlers Diary Blog - Auditing SSH Settings (some Blue Team, some Red Team)
- 5 Reasons CISOs Should Keep an Open Mind about ...
- Hacking Airwaves with Fruit Part 1: WiFi Pineapple Mark IV Basics - EH-Net Online Mag
- HHS continuing to push for health care cyberthreat sharing
- PwC study: Many companies are not prepared to handle cyberattacks
- The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security
- Beginner Guide to Classic Cryptography
- Building the Airplane in Mid-Flight: Bringing Cyber Security Structure to Special Operations Units
- NBlog - the NoticeBored blog: NBlog November 3 - audit sampling (LONG)
- Today You’re Being Hacked - How To Choose Secure Settings
- Healthcare Orgs in the Crosshairs: Ransomware Takes Aim
- Creating a Logging Infrastructure
- Harbor™ by VMware®
- OCR: Mobile Devices Still Pose Security Risk to Health Data
- How to Install LineageOS on Raspberry Pi - Make Tech Easier
- Easy guide to secure VNC server with TLS encryption - LinuxTechLab
- How to create a Hydrogen drumkit for fun and profit | Opensource.com
- OnionShare - A Tool To Share Any Size Of Files Securely And Anonymously | 2daygeek.com
- SQL Updates Newsletter – October 2017 – SQL Server Updates and Lessons Learned
- 12 emerging IT job titles with a bright future | The Enterprisers Project
- Analyzing Song Lyrics | Linux Journal
- The Handbook of Japanese Beans
- Changes in RHEL 7 Security Technical Implementation Guide Version 1, Release 3 - major.io
- My VM is lighter (and safer) than your container | the morning paper
- PASS SUMMIT 2017 - SQL Server Security - Blog dbi services
- (My) CSSLP Notes – Software acceptance | Adventures in the programming jungle
- wildfly | panticz.de
- An Opinion in Defence of NATs
- Testing the Waters: How to Perform Internal Phishing Campaigns | Linux Journal
- How To Check Installed Linux Kernels - OSTechNix
- Using the Correct Tool for the Job
- Are you a Tool or Rain Maker? - The Matrix has you...
- Hilton data breaches lead to $700,000 penalty
- Cisco ASA: Prioritise RDP Traffic | PeteNetLive
- Occupy the cloud: distributed computing for the 99% | the morning paper
- The Four Values of a Devops Transformation | via @codeship
- SQL Server on Linux on Docker quick and easy – Orrin Edenfield
- Four in five companies aim to change the way they manage IT security in the next year
- Blade Server Options for VMware vSAN ReadyNode » Blades Made Simple
- What’s new in SSHGuard 2.1 – Ctrl blog
- A Guide to Attacking Domain Trusts – harmj0y
- A Masscan Tutorial and Primer
- The Equifax Breach – A Cyber WTF Moment - Blog | Tenable™
- 5 questions to ask your CEO about cybersecurity | CSO Online
- State-sponsored cyberattacks are now the preferred method of warfare | CSO Online
- When Is Cybersquatting Illegal? - Law and Daily Life
- NAIC Model Law passes | CSO Online
- An AI detected colorectal cancer with 86 percent accuracy
- http://www.itsmf.org.hk/eng/event35/Carl_COBIT_ITIL_for_Change_Mgmt.pdf
- HP lost key historical archives in California's wildfires
- TBS Structured Wiring Jacket Colors
- Where to Put Structured Wiring Wall Jacks
- RJ11 Phone to RJ45 Jack
- How to Declutter Your Home Office – BizSpark Australia
- Personal Countersurveillance (I): Facial Recognition - Security Art Work
- How to debug Windows Crash Dump – BSOD – MILOSZENGEL.com
- IT That Should Just Work: Backup and Restore ESXi Host Configuration
- Melissa Hathaway on The Future of Cybersecurity - Lawfare
- How To Create An Efficient Kanban Board/Process | Purple Gr...
- How to block executables from APPDATA – MILOSZENGEL.com
- VeriSM is it the future of IT Service Managemen | Purple Gr...
- IT That Should Just Work: Windows Server 2016 Licensing Explained
- Difference between antivirus and antimalware - The Silicon Underground
- Intel NIC vs Realtek networking - The Silicon Underground
- IT security hindering productivity and innovation, survey shows
- Depositions Instead of Searching for Responsive Email? – Bow Tie Law
- The Best Meeting Ever » Public Libraries Online
- LEAP#352 Decoding ACARS – tardate 2017
- The QUIC transport protocol: design and Internet-scale deployment | the morning paper
- CIO Dashboard » Top 10 Metrics for a New CIO
- Signature-Based Detection With YARA
- Quick guide to SIAM
- Managing ESXi Firewall with vSphere client, PowerCLI.
- The (Amateur) Data Science Body of Knowledge – Carpe Datum
- The Five Minute* Guide to Machine Learning – Carpe Datum
- The Data Scientist’s Computer – Carpe Datum
- Investigation: WannaCry cyber attack and the NHS
- Investigation: WannaCry cyber attack and the NHS - National Audit Office (NAO)
- Cisco's Talos Intelligence Group Blog: Threat Spotlight: Follow the Bad Rabbit
- Lecture Notes on Cryptography
- Experience SQL Server 2017: Start your journey here – SQL Server According to Bob
- LogFileParser with PowerShell – PowerInTheShell
- MSSQL Penetration Testing with Metasploit
- Microsoft Azure Notebooks - Online Jupyter Notebooks
- Why Only Use One Controller When You Can Use ALL Of Them? | Hackaday
- A Short Guide to Motherboard Parts and Their Functions
- How to Split a Huge CSV Excel Spreadsheet Into Separate Files
- Building a Home Lab for Offensive Security & Security Research · System Overlord
- Detecting Bad Rabbit Ransomware - Blog | Tenable™
- Using chef, terraform and vCenter
- Our 20 most popular pieces of research - 80,000 Hours
- Bad vs. Less Bad Security Reporting: CoreML vs. Ships
- Bad Rabbit ransomware - Securelist
- Canada's 'super secret spy agency' is releasing a malware-fighting tool to the public
- Announcing the vSphere 6.5 Topology and Upgrade Planning Tool - VMware vSphere Blog
- Managing Cyber Security in Today’s Ever-Changing World
- IOActive Labs Research: Embedding Defense in Server-side Applications
- Reaper: Calm Before the IoT Security Storm? — Krebs on Security
- Panama Papers-style leak may follow breach of offshore law firm Appleby
- NBlog - the NoticeBored blog: NBlog October 27 - Equifax cultural issues
- 5 paths to a career in cybersecurity – Naked Security
- Equifax Was Warned - Motherboard
- Comprehensive Guide to Sniffing
- The Price Of Compliance: Study Uncovers GDPR Costs 10/26/2017
- Congressional Committee Wants Nuance to Share NotPetya Details
- Medical Device Security: What Really Works? - HealthcareInfoSecurity
- Cyber Security=Brand ProtectionWebinar. - HealthcareInfoSecurity
- The Equifax Data Breach: A UK Perspective - HealthcareInfoSecurity
- How a Medical Device Vulnerability Can Compromise Privacy
- Why you should care about concurrency – Gabe's Blog
- Download the ISMG Faces of Fraud Industry Survey
- "TorWitness" Docker Container: Automated (Tor) Websites Screenshots - /dev/random
- Why Patching Software Is Hard: Technical Challenges
- Why Patching Software Is Hard: Organizational ...
- BadRabbit ransomware attacks multiple media outlets | CSO Online
- How Sutton’s Law applies to cybersecurity today | CSO Online
- How much will non-compliance with GDPR cost you? | CSO Online
- Measuring cyber resilience – a rising tide raises all ships | CSO Online
- A Checklist for Securing the Internet of Things
- 3 Steps to Reduce Risk in Your Supply Chain
- Navigating the General Data Protection Regulation with data maps | CSO Online
- Insider threats: the 4 vulnerabilities you’re missing | CSO Online
- 3 Must-Haves for IoT Security: Learn, Segment & Protect | CSO Online
- (My) OWASP Belgium Chapter meeting notes | Adventures in the programming jungle
- (My) CSSLP Notes – Secure Software Requirements | Adventures in the programming jungle
- (My) CSSLP Notes – Secure Software Design | Adventures in the programming jungle
- (My) CSSLP Notes – Secure Software Implementation | Adventures in the programming jungle
- (My) CSSLP Notes – Secure Software Testing | Adventures in the programming jungle
- (My) BruCON 2017 Notes (2) | Adventures in the programming jungle
- (My) Brucon 2017 notes (1) | Adventures in the programming jungle
- Sales Tax Rates in Major Cities, Midyear 2017 - Tax Foundation
- Top 5 Tips for Sales Engineers & Seeking Wisdom – Virtually Sober
- For a dollar, an AI will examine your medical scan
- InfluxData (InfluxDB) | Time Series Database Monitoring & Analytics
- General thoughts about patching | rootpool
- Empty homes | rootpool
- Stricter Data Regulation Is on the Way: Are You Ready? -- Virtualization Review
- Ditch Your HDDs For ACloudA Gateway - ESX Virtualization
- Equifax data breach is also being investigated by UK officials
- CSO Online Daily Dashboard | CSO Online
- How to install and use ReaR (Migration & Recovery tool) on CentOS 7 / RHEL 7
- Bad Rabbit Used Pilfered NSA Exploit
- FDA Spells Out When Medical Device Modifications Need Review
- Flashing TM-AC1900 to RT-AC68U ~ Bay Area Tech Pros
- World's Most Common Industrial Control Protocol Dates From 1979
- InfoSec Needs to Embrace New Tech Instead of Ridiculing It
- Ransomware in Healthcare: Time for Vigilance - HealthcareInfoSecurity
- Differences between PSU / BP and RU / RUR
- How to roll your own backup solution with BorgBackup, Rclone, and Wasabi cloud storage | Opensource.com
- Using Cron with EMC VNX and Celerra - THE SAN GUY
- Create Network Diagram from LLDP Neighbor Information « ipSpace.net by @ioshints
- A Sample Makefile for Publishing Blog Articles
- Think Carefully Before Signing Up For a High Deductible Health Plan
- Infrastructure Monitoring with TICK Stack - via @codeship | via @codeship
- Report GPOs with Script References | Alan's Blog
- An Overview of the Security Ecosystem in Programming - via @codeship | via @codeship
- Desired State Configuration(DSC) for SQL Server ***Update 2 – Troy Ault's Blog
- Query Store Best Practices for Mission Critical or Busy SQL Server | Vikas Rana
- The new dynamics of strategy: sense-making in a complex and complicated world | the morning paper
- Seth's Blog: Price vs. cost
- SQL Server 2016 Express SP1 – Always Encrypted – Premier Developer
- KRACK vulnerability breaks encryption over every Wi-Fi networks – Marksei
- Why Setting IT Priorities Is So Important - IT Jungle
- GTD Infographic
- Why Hospitals Need Better Data Science
- More Than Digital Dirt: Preserving Malware in Archives, Museums, and Libraries
- Find native memory leaks in Java
- Shrink VirtualBox VDI files with TRIM | Erik Wramner
- How to create a “heatmap” graph network visualization – David Vassallo's Blog
- What is an Business Continuity Plan? (BCP) | Tom Smyth's Blog
- Why Outsource your Information Technology? | Tom Smyth's Blog
- What is an IT Strategic Plan and what does it contain? | Tom Smyth's Blog
- Responding to KRACK: What You Need To Know - Blog | Tenable™
- Update to Pentest Metasploit Plugin
- Sysinternals Sysmon 6.10 Tracking of Permanent WMI Events
- Basics of Tracking WMI Activity
- Getting Gigabit Networking on a Raspberry Pi 2, 3 and B+ | Jeff Geerling
- 5 steps leaders can take to improve cybersecurity in their organization - TechRepublic
- Virtualization The Future: VMware Certification Tracks Defined
- HIPAA Compliance: Self-Insured Company Reports Breach
- How to install and use Uncomplicated Firewall in Ubuntu - TechRepublic
- Meet Bill Pollock, founder of No Starch Press | Opensource.com
- Install a Centralized Log Server with Rsyslog in Debian 9
- How To Display Date And Time In History Command | 2daygeek.com
- What Next Now the KRACK Smoke is Clearing? - MovingPackets.net
- What Cybersecurity Standard Will a Judge Use in Equifax Breach Suits? - Lawfare
- Cyber Operations and the Draft NDAA: Analyzing Section 1621 (and SecDef's Objections) - Lawfare
- Getting started with Logstash | Opensource.com
- KRACK Vulnerability: What You Need To Know | Electronic Frontier Foundation
- Top 5 cybersecurity facts, figures and statistics for 2017 | CSO Online
- The Costs of Failing to Maintain Important Machinery
- InfoSec Handlers Diary Blog - Baselining Servers to Detect Outliers
- Blood Test Results Exposed in Cloud Repository
- How GDPR is impacting the way privacy is done
- Privacy and security of telehealth must be addressed
- Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update
- Build it right with NIST’s Cybersecurity Framework | CSO Online
- NICE Cybersecurity Workforce Framework | NIST
- CSO Online Daily Dashboard | CSO Online
- Errata Security: Some notes on the KRACK attack
- RPM Post-Upgrade Scripts · Lindsay Hill
- War Stories: Always Check Your Inputs · Lindsay Hill
- DragonFlyBSD: DragonFly BSD
- Japanese women rank the otaku obsessions they can most forgive in a partner - Japan Today
- Microsoft’s internal bug database was hacked in 2013
- Boost Your Business with These 10 Foods
- Are your employees snooping on your corporate network?
- Understanding AWS Tenancy - The IT Hollow
- KRACK WPA2 Vulnerability Announced - Upgrade Now - MovingPackets.net
- https://blog.scottlowe.org/2017/10/17/rock-stars-builders-janitors/
- default listener port – Laurent Schneider
- Don’t Worry About KRACK - Lawfare
- Project Management Apprenticeships Change the Face of that Career
- 6 hard truths IT must learn to accept | CIO
- Templates - Journals, CVs, Presentations, Reports and More - Overleaf
- Some Tools of a PFE – PowerInTheShell
- 8 Fantastic Facilitation Playbooks for Designing Productive Nonprofit Meetings | Beth's Blog